Clé USB 64 Go iStorage datAshur Personal2 USB 3.0

What is datAshur Personal2?

The iStorage datAshur Personal2 is an easy to use and affordable USB 3.0 flash drive, employing PIN code access with military grade XTS-AES 256-bit hardware encryption. The datAshur Personal2 incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.

All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Personal2 is lost or stolen. The datAshur Personal2 automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time.

The datAshur Personal2 operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Personal2 delivers drag and drop encryption, plug and play simplicity and can be used with any software.

The datAshur Personal2 can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur Personal2 also incorporates a drive reset feature which clears both User and Admin PINs, deletes all data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur Personal2 is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.

As the iStorage datAshur Personal2 is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur Personal2 protects your data with a “Brute Force Hack Defence Mechanism”. If both Admin and User PINs have been created and a User enters an incorrect User PIN 10 (ten) consecutive times, the datAshur Personal2's brute force mechanism will trigger and the User PIN will be deleted. All data will remain on the datAshur Personal2 and can only be accessed by the Admin entering the correct Admin PIN. If Admin enters an incorrect Admin PIN 10 (ten) consecutive times, then both the User and Admin PINs, the encryption key and all data will be deleted and lost forever The datAshur Personal2 will then revert back to factory default settings and will need to be formatted before it can be reused.

The datAshur Personal2 is an investment that will last for years.

How does datAshur Personal2 work?

Step 1: Enter your PIN

Step 2: Plug & Play

Step 3: Unplug to automatically lock

Why choose datAshur Personal2?

Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.

Information Commissioner's Office (ICO)

The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.

General Data Protection Regulation (GDPR)

The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.

Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datAshur Personal2 can protect you against all of this.

What is the difference between software and hardware encryption?

Software encryption:

Complex passwords can be cracked easily and quickly with a Brute Force Attack

Simple password cracking software is readily available on the internet, often free of charge

Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger

Software encryption can be corrupted by viruses

Software encryption is much slower when compared to hardware encryption

Software encryption needs to be installed on each computer that the external storage device is used on

Software encryption shares computers resources to encrypt data with other programs on the computer, making it only as safe as your computer.

Hardware encryption:

The datAshur Personal2 cannot be brute force attacked

The datAshur Personal2 is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard

The datAshur Personal2 does not require any software and can be used on any Windows, Mac, Linux, Chrome, Android, Thin Clients and Embedded Systems.

Encryption is performed in real-time thus there is no speed degradation

Informer un ami

What is datAshur Personal2?

The iStorage datAshur Personal2 is an easy to use and affordable USB 3.0 flash drive, employing PIN code access with military grade XTS-AES 256-bit hardware encryption. The datAshur Personal2 incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.

All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Personal2 is lost or stolen. The datAshur Personal2 automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time.

The datAshur Personal2 operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Personal2 delivers drag and drop encryption, plug and play simplicity and can be used with any software.

The datAshur Personal2 can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur Personal2 also incorporates a drive reset feature which clears both User and Admin PINs, deletes all data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur Personal2 is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.

As the iStorage datAshur Personal2 is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur Personal2 protects your data with a “Brute Force Hack Defence Mechanism”. If both Admin and User PINs have been created and a User enters an incorrect User PIN 10 (ten) consecutive times, the datAshur Personal2's brute force mechanism will trigger and the User PIN will be deleted. All data will remain on the datAshur Personal2 and can only be accessed by the Admin entering the correct Admin PIN. If Admin enters an incorrect Admin PIN 10 (ten) consecutive times, then both the User and Admin PINs, the encryption key and all data will be deleted and lost forever The datAshur Personal2 will then revert back to factory default settings and will need to be formatted before it can be reused.

The datAshur Personal2 is an investment that will last for years.

How does datAshur Personal2 work?

Step 1: Enter your PIN

Step 2: Plug & Play

Step 3: Unplug to automatically lock

Why choose datAshur Personal2?

Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.

Information Commissioner's Office (ICO)

The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.

General Data Protection Regulation (GDPR)

The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.

Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datAshur Personal2 can protect you against all of this.

What is the difference between software and hardware encryption?

Software encryption:

Complex passwords can be cracked easily and quickly with a Brute Force Attack

Simple password cracking software is readily available on the internet, often free of charge

Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger

Software encryption can be corrupted by viruses

Software encryption is much slower when compared to hardware encryption

Software encryption needs to be installed on each computer that the external storage device is used on

Software encryption shares computers resources to encrypt data with other programs on the computer, making it only as safe as your computer.

Hardware encryption:

The datAshur Personal2 cannot be brute force attacked

The datAshur Personal2 is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard

The datAshur Personal2 does not require any software and can be used on any Windows, Mac, Linux, Chrome, Android, Thin Clients and Embedded Systems.

Encryption is performed in real-time thus there is no speed degradation